Keywords: Fog computing, Data mining, Clouding computing, Cloud security.
|
|
- Andra Barbara Benson
- 5 years ago
- Views:
Transcription
1 Volume 7, Issue 3, March 2017 ISSN: X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Data Security System in Cloud by Using Fog Computing and Data Mining Parashar Sangle, Romit Deshmukh, Rohit Ghodake, Akash Yadav, Prof. Jitendra Musale Department of Computer Engineering, Abmsp s Anantrao pawar College of Engineering & Research, Pune, Maharashtra, India DOI: /ijarcsse/V7I3/0119 Abstract: Cloud computing can be defined as a group of computers and servers which are connected together on a network. Now-a-days, as many organizations and enterprises are beginning to adopt IOT (internet of things), they all need large amount of data to be accessed quickly, to ensure safety on cloud from attacker or insider, it is important to secure cloud data; this can prove helpful in government organization or any IT-industry. In any case if the existing encryption data protection mechanism fails in preventing data theft attacks from criminal attacker, especially from insider to the cloud provider; to provide security to cloud data from unauthorized access from malicious attacker we propose a different approach to secure the data in cloud system by using decoy technology. We monitor user behavior or data access patterns in cloud system and identify abnormal data access patterns. When any unauthorized data access pattern is suspected then the decoy data is provided to the unauthorized user. This mechanism ensures protection against the misuse of the user s real data. In any case if the real user gets trapped in this system then user can challenge the system asking for one-time password (OTP) for verification. Keywords: Fog computing, Data mining, Clouding computing, Cloud security. I. INTRODUCTION Cloud computing is a group of computers and servers that are connected together over the internet. Today many small-scale or large-scale organizations as well as many enterprises use cloud to store large amount of data, the data might be private data or business information. There is a need of large amount of data to be accessed faster and locally and is ever growing. This is where the fog computing comes into picture. Fog computing is a term created by Cisco. Fog computing, also known as fog networking, it is a distributed infrastructure in which certain application services are managed at the edge of the network by using device and other still managed in the cloud. Basically it is a middle layer between the cloud and hardware or user end devices, which provides efficient analysis, data processing and storage. The goal of fog computing is to improve efficiency and reduce the amount of data that needs to be transported to the cloud for data processing, analysis and storage. If attackers are intelligent and launch attack against cloud system, then it is easy to break cloud user s password or if attacker is an insider then it is possible to steal someone s user ID and password easily and try to get unauthorized access of cloud system in order to steal private or business information of a particular user. To overcome this problem, we propose different technique to provide security to cloud data from unauthorized user by creating confusion by using decoy technology. That we have come to call fog computing. We can use this technology to launch disinformation attacks against unauthorized user or insider thereby preventing them the access to real user data. In this paper the system monitors user behavior activity or real user data access patterns, if any abnormal data access patterns are suspected then fog computing launches this disinformation attack against unauthorized user. In this decoy data base are filled with fake information when any abnormal data access patterns are identified by system then fake data from decoy database is provided to the invalid user. By using this technology, we can secure original cloud data from attackers and also protects misuse of real user information. II. PROPOSED SYSTEM In our proposed system we have illustrated different entities in Figure 1 data owner client, cloud service provider and cloud server. 1. Data owner: The data owner is the real authorized person who stores private data or business information on cloud. 2. Cloud server: The cloud server is covered with fog network which processes the client request and grant access to the cloud. 3. Admin user: The admin manages user logs, files, creates file signature, manage decoy data base or files. 2017, IJARCSSE All Rights Reserved Page 88
2 Figure 1: System Model (Proposed system) After registration of new user, client gets the desired space on cloud and is able to perform valid operation on cloud data-base such as add new files, delete files, download files, search files, and ask for one-time password(otp) for verification. Whenever user requests for data the request is received by cloud service provider before responding to the client request it will load user profile activity logs and apply mining technique and predict/calculate current request parameters or it will check the user patterns; if it is valid then real information is given to the user otherwise fog network launches disinformation attack and it will send fake or decoy information to user and this scenario will be immediately reported to the admin and system logs will be updated. But sometime there is a possibility of real user patterns being different and hence do not match with the system; at that time fake data is provided to real user as well, but at that time owner of data knows the system is sending decoy data as the owner is aware of the of the content or information; in this particular situation the real user can challenge the system by asking one-time password (OTP) for verification of his/her identity. OTP function is also secured with secure hash algorithm (SHA-1). This cryptographic hash function is helpful against Man In the Middle Attack (MIM), therefore it will improve the security of the system. This proposed system also maintains transparency because all the system mechanism is hidden from the user or attacker. The system admin can also perform valid operation such as, manage decoy files, create file signature and update user logs. III. EXISTING SYSTEM Following are the existing systems that imply fog computing Smart grid system: The fog computing plays an important role in smart grid system. In this system as per energy demand, availability of these devices automatically switches to alternative energies like solar or wind. The Fog collectors at the edge processes the data generated by grid devices and sensors and send control commands to the actuators. It is used to filter the data which is locally consumed and send to the higher tiers for visualization, transactional analytics and real time report data. Figure 2: Fog computing in smart grid. 2017, IJARCSSE All Rights Reserved Page 89
3 3.2. Smart traffic light system: Figure 3: Fog computing in smart traffic light system. The above system has video cameras that sense an ambulance flashing light so it can automatically change street light and open or clear lanes for the ambulance vehicle to pass through traffic. These sensors fetch the required input for the system to measure speed and distance of an oncoming vehicle. This system light turns green once sensors identify movements and turn red as traffic passes. Neighboring smart lights serving as fog devices coordinate to create green traffic wave and it will send warning signals to oncoming vehicles. IV. SECURING CLOUD BY USING FOG NETWORK Various methods are implied for securing data on cloud server by using different type of techniques. Sometimes this technique fails or is unsuccessful in securing user cloud data from insider attacks and sometimes other reason also come into picture such as, misconfiguration of services and other bugs in code User Behavior Profiling: User profiling is a well-known technique that can be applied here to how, when and how much a user accesses their information from cloud database. The system continuously monitors user behavior to check whether the pattern is normal or else abnormal access or unauthorized access to user information might be in action. Each user has a distinct profile consisting of number of times the user has accessed his files from cloud server. If there is any divergence in user behavior against the profile which is already stored in database, then it can be identified as an invalid user and attack is detected Decoys: Decoy information are the fake documents, trap-files, honey-files and other fake information that are uploaded by cloud system administrator on system. Fake information contains all false data which create confusion to attacker. This technique is incorporated along with user behavior profiling. When unauthorized access is identified then disinformation attack is launched and decoy data base starts providing fake data to particular user in such a way which is completely legitimate or legal or normal. Only true owner user of data can identify when fake data is provided by cloud data base then real user can ask one-time password for verification. This secures users actual data on cloud and protects it from misuse of real data by unauthorized user. V. COMBINING USER BEHAVIOR PROFILING AND DECOY TECHNOLOGY FOR MASQUERADE DETECTION 5.1. User Behavior Profiling The legal users of the system are familiar with the file system and the location where they are stored. Whenever there is a masquerader who gets the access of real user system illegally, is unlikely to be familiar with file structure and data or content of that file system. This fake user search is likely to be widespread or untargeted or we can say their search may not be to the point. Basically user search behavior is profiled and developed based on some key assumption. Models are trained with a one class modeling technique i.e. one class support vector machine. It will maintain user privacy and secure the user data. All the real or normal user patterns are modeled. This model is helpful to compare and determine whether the user accessing the system is real user or a masquerade Decoy Technology: All the data within decoy data base are fully filled with honey -files, trap-files, fake or with bogus information which is uploaded by system admin or cloud service provider of the system. A masquerader who is unaware with system or file system and location of the data it will try to click on decoy files. Therefore, the system is notified of unauthorized activity. The advantages of placing decoys in a file system: 1. It will be helpful for detection of illegal or masquerade activity. 2. It will create confusion to the attacker or insider. 2017, IJARCSSE All Rights Reserved Page 90
4 3. The combination of decoy technology and user behavior profiling produce strong proof or evidence of illegal or unauthorized activity of accessing the data and is also helpful to improve the accuracy of detection. The user behavior is identified by using data access patterns. This pattern may be determined by the number of upload, download count, time of accessing data and session. All these records are maintained by the system. When any users access the system, his behavior is matched with the user behavior profile which is stored in the database. If the behavior or patterns is matching, then we can say that the user is real and accessing the data or it said to be user is illegal who has gained access to data. VI. ALGORITHM AND EXAMPLE 6.1 Naive Bayes: Naive Bayes is a classification method or a technique based on the Bayes theorem with an assumption of independence between predictors. In other words, we can say a naive bayes classifier that assume presence of a particular feature in class is unrelated to the presence of any other feature...(1). where: n = the number of training examples for which v. nc = number of examples for which v = vj and a. p = a priori estimate for P. m = the equivalent sample size...(2). 6.2 The Classifier Example: Table 1: Classifier Example. No. Time-Slot Session-Duration Upload-Count Download-Count Black-list Count Output 1. Morning Medium Normal Normal Low Valid 2. Morning Short Normal Normal Low Invalid 3. Noon Long Normal Normal Low Valid 4. Evening Long Normal Normal Low Valid 5. Evening Long Normal Normal Medium Valid 6. Night Long Normal Abnormal High Invalid 7. Night Long Normal Abnormal Medium Invalid 8. Night Long Abnormal Abnormal High Invalid 9. Night Long Normal Abnormal High Invalid 10. Noon Medium Abnormal Normal High Invalid 11. Evening Long Abnormal Normal High Invalid 12. Noon Medium Normal Normal Medium Valid 13. Night Long Abnormal Abnormal Low Invalid 14. Night Long Abnormal Abnormal Low Invalid 6.3 Training example: We have P(Valid) = 5/14=0.357and P(Invalid) = 9/14= , IJARCSSE All Rights Reserved Page 91
5 Suppose we want to apply naïve Bayes classifier for (Night, Short, Normal, Abnormal, Medium). Note there is no example of (Night, Short, Normal, Abnormal, Medium) in our dataset. Looking back at equation (2) we can see how to compute this. We need to calculate the probabilities P (Night Valid), P (Short Valid), P (Normal Valid), P (Abnormal Valid), P (Medium Valid). P(Night Invalid), P(Short Invalid),P(Normal Invalid),P(Abnormal Invalid),P(Medium Invalid) and multiply them by P(Yes) and P(No) respectively. Table 2: Attributes and Values P(Night Valid)=0/5=0 P(Night Invalid)=6/9=0.67 P(Short Valid)=0/5=0 P(Short Invalid)=1/9=0.11 P(Normal Valid)=5/5=1 P(Normal Invalid)=4/9=0.44 P(Abnormal Valid)=0/5=0 P(Abnormal Invalid)=6/9=0.67 P(Medium Valid)=2/5=0.4 P(Medium Invalid)=1/9=0.11 Looking at P(Night Valid), we have 5 cases where vj = Valid, and in 0 of those cases ai = Night. So for P (Night Valid),n = 6 and nc = 0. Note that all attributes are binary (two possible values). We have P(Valid) = and P(Invalid) = 0.571, so we can apply equation (2). For v = Valid, we have, P(Valid) * P(Night Valid) * P(Short Valid) * P(Normal Valid) * P(Abnormal Valid) * P(Medium Valid) = * 0 * 0 * 1 * 0 * 0.4 = 0.0 and for v = Invalid, we have, P(Invalid) * P(Night Invalid) * P(Short Invalid) * P(Normal Invalid) * P(Abnormal Invalid) * P(Medium Invalid) = * 0.07 * 0.11 * 0.44 * 0.67 * 0.11 =.0001 Since 0<0.0001, our example gets classified as Invalid Thereby the user gets classified as INVALID USER. 6.4 Security: This system maintains integrity of data and Transparency of mechanism which works in the background and also provides security to the user s password and one-time password in database. All the user s password and one-time password are saved in database in the form of hash value by using SHA11 algorithm. 6.5 SHA-1 (Secure Hash 1) Algorithm: In cryptography Secure Hash Algorithm 1 is a hash function designed by the U.S National Security Agency. Secure hash algorithm 1 produces a 20-byte (160-bit) hash value knows as message digest. 6.6 Pseudo code that is used to encode the password by SHA-1 MessageDigest md = MessageDigest.getInstance("SHA-1"); byte[] passbyte; passbyte = "abcpqrs19".getbytes("utf-8"); passbyte = md.digest(passbyte); 6.7 Why SHA 1? The Secure Hash Algorithm 1 is stronger than MD5 hash Algorithm because SHA-1 generates a hash of 160-bits whereas, MD5 generates a hash of 128-bits. MD5 algorithm does not work against collisions attack whereas SHA-1 is stronger against collision attacks. MD5 algorithm can be cracked easily by attacker. On other hand SHA-1 is difficult to crack. Therefore, SHA-1 is recommended more than MD5 algorithm for hashing. 6.8 SHA-1Vs MD5: Table 3: SHA1 vs. MD5. SHA-1 Algorithm MD5 Algorithm 1.SHA-1 has 160-bit hash value 1.MD5 has 128-bit hash value 2.SHA-1 support 80 rounds 2.MD5 support 64 rounds 3.Stronger against collision attacks 3. Weak against collision attacks 4. Slower than MD5 because it required 80 iterations. 4. Faster than SHA-1 because it required 64 iterations. 5. It required bit operation to break. 5. It required bit operation to break. VII. IMPLEMENTATION This system is divided in two panels Admin panel and User Panel. Admin Panel: Admin is user who has authority to manage dataset, files, load dataset, create signature on file, manage decoy database and can perform various operations. User panel: User is a client and there can be single or multiple users associated with username, password who store and retrieve data form cloud storage and also perform valid operation on database such as, upload files, download files, search 2017, IJARCSSE All Rights Reserved Page 92
6 file, delete files and request for one-time password for verification of real user identity. In user panel the one-time password plays a very important role; if in case real user gets decoy data from cloud server, the user can request for onetime password for verification challenge. 7.1 Admin Panel: This is the system admin panel as shown in figure; here admin login with his name and password to perform further operations. After successful login admin can then perform management operations on the database. Figure 4: Admin Login Application. After successful login the admin can manage files, dataset and load new dataset. By clicking on load data set admin can import new data from file system After clicking on manage data-set admin can create new multiple folders, upload new files and delete unwanted files. The Manage data set shows user activity such as time, duration, upload count, download count, and blacklist count as well as verify user identity whether it is normal user or invalid user. Figure 5: Admin Application. 7.2 User Panel: A new user can create new account by providing basic information and all of this information are stored in a database. Once user is successfully registered then user can login with his user name and password to access application. If user enter wrong password and user-id, then access is denied by system or user can click on forgot to set-up a new password. The following fig shows the user registration form. 2017, IJARCSSE All Rights Reserved Page 93
7 Figure 6: User Registration Form. After successful registration of new user; the user can then login by providing valid username and password for authentication. If user is a valid-user, then user can perform valid operations on drive and access real data from cloud. If user is unauthorized then server delivers decoy data to that particular user. Figure 7: User Login Form. The entire unauthorized user is black-listed and all the activity logs are stored in the database. The system admin can verify how many valid users have accessed valid data and how many in-valid users are blacklisted. After successfully login, user can access application and perform various activities such as add files, access drive and manage logs. By clicking on access drive user can views his all files as well as user can directly search particular file by typing-in the file name, download files and delete unwanted files. User can select file and download file from cloud server. If user is valid then original data is provided by cloud server and if user is in-valid then cloud server sends decoy data to in-valid user. The user activity logs show the user activity such as previous login, data access time, upload, and download files logs. Fig shows the user application main form. Figure 8: User Application. 2017, IJARCSSE All Rights Reserved Page 94
8 All the information of admin and user client are stored in database tables. The system backend is MYSQL database which stores the user information according to tables. Database contains various tables such as files, hash table, user info, user profile etc. as show in fig. In the previous system Man-In-The-Middle attack can expose the fog computing network; but in our system we overcome this problem by providing security by the OTP function and user password in data base. For security purpose user password and OTP are encoded by SHA-1 algorithm and then stored in the form of hash value. Therefore, the system security increases and secure from Man-In-The-Middle attack. Figure 9: System Database. VIII. ADVANTAGES AND FUTURE SCOPE 8.1. Advantages: 1. The data stored on the cloud can be stored in a secure way. 2. The system maintains data integrity. 3. The System protects against misuse of real user data. 4. It will provide security against MIM (Man In the Middle) attacks. 5. This system creates confusion for attacker by using or placing decoy files in file system. 6. It will help to detect illegal data access and provide false information to the unauthorized person Future Scope: 1. We can develop Android and ios application for mobile. to secure cloud data. 2. Study of how attacker s behavior changes according to their knowledge about the monitoring method on the target system 3. Data can also be divided and stored on multiple clouds for extra security. 4. Hadoop framework can be used for distributed storage and processing of very large data sets. 5. High version of SHA algorithm can be use to improve system security. IX. CONCLUSION An application for securing original cloud data from unauthorized user and providing real or decoy data to user as based on users patterns; here user takes the advantage of the entire feature which are provided by this application. For this user simply required internet connection to establish connection with cloud data server. This system identifying user s real patterns if it is match then this system provide real data from cloud data server to user and if any unauthorized or attacker want to access cloud data then by using fog computing this system provides decoy data to unauthorized user. Incase authorized user getting decoy data if user patterns not matching then in that situation real user can ask one-time password (OTP)for verification. By using this system private and business information can be safe from third party user or hackers. All this mechanism working in background of the system therefore this system maintains transparency, maintain data integrity and create confusion for attacker by giving decoy information from decoy data base. REFERENCES [1] Parashar Sangle,Rohit Ghodake, Romit Deshmukh, Akash Yadav, Prof.Jitendra Musale. Data Security System in cloud by using Fog Computing & Data Mining International Journal of Engineering and Computer Science ISSN: Volume 5 Issue 12 Dec. 2016, Page No [2] Ben-Salem M., and Stolfo, Angelos D. Keromytis, Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud, IEEE symposium on security and privacy workshop (SPW) , IJARCSSE All Rights Reserved Page 95
9 [3] Sayali Raje,Namrata Patil,Shital Mundhe,Ritika Mahajan Cloud Security Using Fog Computing Proceedings of IRF International Conference, 30th March-2014, Pune, India, ISBN: [4] Ivan Stojmenovic,Sheng Wen The Fog Computing Paradigm:Scenarios and Security Issues proceeding of the 2014 federated conference on computer science and information systems pp. 1-8 DOI: /2014F503 ACSIS,Vol.2. [5] Nadhiya Nazeer khan Fog Computing: A Better Solution For IoT International Journal of Engineering and Technical Research (IJETR) ISSN: , Volume-3, Issue-2, February [6] Ben-Salem M., and Stolfo, Decoy Document Deployment for Effective Masquerade Attack Detection, Computer Science Department, Columbia University, New York. [7] Manreet kaur, Fog Computing Providing Data Security: A Review, International Journal of Advanced Research in Computer Science and Software Engineering. [8] F. Bonomi, Connected vehicles, the internet of things, and fog com- puting, in The Eighth ACM International Workshop on Vehicular Inter- Networking (VANET), Las Vegas, USA, [9] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, Fog computing and its role in the internet of things, in Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, ser. MCC 12. ACM, 2012, pp [10] G.Subbalakshmi, K. Ramesh, M. Chinna Rao Decision Support in Heart Disease Prediction using Naïve Bayes Indian Journal of Computer Science and Engineering(IJCSE). [11] Eric Meisner NaïveBayesClassifierExample Nov 22, , IJARCSSE All Rights Reserved Page 96
1. INTRODUCTION 2. PROPOSED SYSTEM. Parashar Sangle, IJECS Volume 05 Issue 12 Dec., 2016 Page No Page 19489
www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 5 Issue 12 Dec. 2016, Page No. 19489-19493 Data Security System in Cloud by Using Fog Computing and Data Mining
More informationTrusted Profile Identification and Validation Model
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 7, Issue 1 (May 2013), PP. 01-05 Himanshu Gupta 1, A Arokiaraj Jovith 2 1, 2 Dept.
More informationA Two-Fold Authentication Mechanism for Network Security
Asian Journal of Engineering and Applied Technology ISSN 2249-068X Vol. 7 No. 2, 2018, pp. 86-90 The Research Publication, www.trp.org.in A Two-Fold for Network Security D. Selvamani 1 and V Selvi 2 1
More informationSmart-card-loss-attack and Improvement of Hsiang et al. s Authentication Scheme
Smart-card-loss-attack and Improvement of Hsiang et al. s Authentication Scheme Y.. Lee Department of Security Technology and Management WuFeng niversity, hiayi, 653, Taiwan yclee@wfu.edu.tw ABSTRAT Due
More informationMulti-factor Authentication Using Mobile Phones
Multi-factor Authentication Using Mobile Phones Prathamesh S. Dhanorkar 1, Atish R. Jadhav 2, Assistant Professor Shweta B. Barshe 3 1 Department of Computer Engineering, BVCOE, 2 Department of Computer
More informationNetwork Security Issues and Cryptography
Network Security Issues and Cryptography PriyaTrivedi 1, Sanya Harneja 2 1 Information Technology, Maharishi Dayanand University Farrukhnagar, Gurgaon, Haryana, India 2 Information Technology, Maharishi
More informationCloud Computing: Security Issues & Solution
International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 13, Number 6 (2017), pp. 1419-1429 Research India Publications http://www.ripublication.com Cloud Computing: Security
More informationAuthenticating using Variable One Time Password in Cloud Computing over Existing Honey Pot Technology for Framework Improvement
IJIRST International Journal for Innovative Research in Science & Technology Volume 5 Issue 2 July 2018 ISSN (online): 2349-6010 Authenticating using Variable One Time Password in Cloud Computing over
More informationCHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM
109 CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM Security is considered to be the most critical factor in many applications. The main issues of such
More information9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers
Cryptography Basics IT443 Network Security Administration Slides courtesy of Bo Sheng Basic concepts in cryptography systems Secret cryptography Public cryptography 1 2 Encryption/Decryption Cryptanalysis
More information06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security
1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security Dr. L. Christofi 1 0. Overview As the knowledge of computer networking and protocols has become more widespread, so the threat of
More informationPulseway Security White Paper
Pulseway Security White Paper Table of Contents 1. Introduction 2. Encryption 2.1 Transport Encryption 2.2 Message Encryption 3. Brute-Force Protection 4. DigiCert Code Signing Certificate 5. Datacenter
More informationDouble Guard: Detecting intrusions in Multitier web applications with Security
ISSN 2395-1621 Double Guard: Detecting intrusions in Multitier web applications with Security #1 Amit Patil, #2 Vishal Thorat, #3 Amit Mane 1 amitpatil1810@gmail.com 2 vishalthorat5233@gmail.com 3 amitmane9975@gmail.com
More informationCryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng
Cryptography Basics IT443 Network Security Administration Slides courtesy of Bo Sheng 1 Outline Basic concepts in cryptography systems Secret key cryptography Public key cryptography Hash functions 2 Encryption/Decryption
More informationAES and DES Using Secure and Dynamic Data Storage in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationInternational Journal of Advance Engineering and Research Development
Scientific Journal of Impact Factor (SJIF): 5.71 e-issn (O): 2348-4470 p-issn (P): 2348-6406 International Journal of Advance Engineering and Research Development Volume 5, Issue 03, March -2018 A SURVEY
More informationA Review Paper on Network Security Attacks and Defences
EUROPEAN ACADEMIC RESEARCH Vol. IV, Issue 12/ March 2017 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.4546 (UIF) DRJI Value: 5.9 (B+) A Review Paper on Network Security Attacks and ALLYSA ASHLEY
More informationPYTHIA SERVICE BY VIRGIL SECURITY WHITE PAPER
PYTHIA SERVICE WHITEPAPER BY VIRGIL SECURITY WHITE PAPER May 21, 2018 CONTENTS Introduction 2 How does Pythia solve these problems? 3 Are there any other solutions? 4 What is Pythia? 4 How does it work?
More informationAUTHENTICATION AND LOOKUP FOR NETWORK SERVICES
Vol.5, No.1, pp. 81-90, 2014 doi: 10.7903/ijecs.1040 AUTHENTICATION AND LOOKUP FOR NETWORK SERVICES Daniel J. Buehrer National Chung Cheng University 168 University Rd., Min-Hsiung Township, Chiayi County,
More informationAuthentication Technology for a Smart eid Infrastructure.
Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts
More informationIMPLEMENTATION OF KERBEROS BASED AUTHENTICATED KEY EXCHANGE PROTOCOL FOR PARALLEL NETWORK FILE SYSTEMS IN CLOUD
[1] [1] ISSN: 0976-3104 SPECIAL ISSUE: Emerging Technologies in Networking and Security (ETNS) Chandravathi et al. ARTICLE OPEN ACCESS IMPLEMENTATION OF KERBEROS BASED AUTHENTICATED KEY EXCHANGE PROTOCOL
More informationA Modified Approach for Kerberos Authentication Protocol with Secret Image by using Visual Cryptography
A Modified Approach for Kerberos Authentication Protocol with Secret Image by using Visual Cryptography Ashok Kumar J 1, and Gopinath Ganapathy 2 1,2 School of Computer Science, Engineering and Applications
More informationImprovised Security for EAV data model using Negative Shuffled database
Improvised Security for EAV data model using Negative Shuffled database Miss Pooja Pandurang Varatk 1, Prof. Amarja Adgaonkar 2, Prof. Neha Jain 3 1Student, Computer Engineering Department, Shree L.R.Tiwari
More informationII. LITERATURE SURVEY
Secure Transaction By Using Wireless Password with Shuffling Keypad Shweta Jamkavale 1, Ashwini Kute 2, Rupali Pawar 3, Komal Jamkavale 4,Prashant Jawalkar 5 UG students 1,2,3,4, Guide 5, Department Of
More information(2½ hours) Total Marks: 75
(2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.
More informationSECURED PASSWORD MANAGEMENT TECHNIQUE USING ONE-TIME PASSWORD PROTOCOL IN SMARTPHONE
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 3, March 2014,
More informationWeb Tap Payment Authentication and Encryption With Zero Customer Effort
Web Tap Payment Authentication and Encryption With Zero Customer Effort Henry Ng Tap-Card-Pay Systems Corporation, Vancouver BC V5X3Y3, Canada henryng@tapcardpay.com Abstract. We propose a public-key authentication
More informationAttribute Based Encryption with Privacy Protection in Clouds
Attribute Based Encryption with Privacy Protection in Clouds Geetanjali. M 1, Saravanan. N 2 PG Student, Department of Information Technology, K.S.R College of Engineering, Tiruchengode, Tamilnadu, India
More informationCONIKS: Bringing Key Transparency to End Users
CONIKS: Bringing Key Transparency to End Users Morris Yau 1 Introduction Public keys must be distributed securely even in the presence of attackers. This is known as the Public Key Infrastructure problem
More informationImplementation of ATM security using IOT
Implementation of ATM security using IOT Mahalakshmi.T.K 1, J.Kumudha 2, M.Ranjitha 3, Mr.J.Gurumurthy 4, Dr.D.Sivakumar 5 1,2,3 Department of electronics and communication engineering, Easwari engineering
More informationInternational Journal of Scientific Research and Reviews
Research article Available online www.ijsrr.org ISSN: 2279 0543 International Journal of Scientific Research and Reviews Asymmetric Digital Signature Algorithm Based on Discrete Logarithm Concept with
More informationKey Management. Digital signatures: classical and public key Classic and Public Key exchange. Handwritten Signature
Key Management Digital signatures: classical and public key Classic and Public Key exchange 1 Handwritten Signature Used everyday in a letter, on a check, sign a contract A signature on a signed paper
More informationIJSER. Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology
ISSN 2229-5518 321 Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology Abstract - Nowadays all are working with cloud Environment(cloud
More informationLecture 41 Blockchain in Government III (Digital Identity)
Blockchains Architecture, Design and Use Cases Prof. Sandip Chakraborty Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 41 Blockchain in Government III
More informationConcurrent Distributed Authentication Model (CDAM)
Concurrent Distributed Authentication Model (CDAM) Aladdin T. Dandis Information Security Compliance Officer Jordan egovernment Program / MoICT 1 Agenda Introduction CDAM Ver. 1.0 Pros and Cons CDAM Ver.
More informationSEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security
SEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security Consider 2. Based on DNS, identified the IP address of www.cuhk.edu.hk is 137.189.11.73. 1. Go to http://www.cuhk.edu.hk 3. Forward the
More informationGenerating A Digital Signature Based On New Cryptographic Scheme For User Authentication And Security
Indian Journal of Science and Technology, Vol 7(S6), 1 5, October 2014 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Generating A Digital Signature Based On New Cryptographic Scheme For User Authentication
More informationIntroduction to VANET
VANET Introduction to VANET -Vehicles connected to each others through an ad hoc formation form a wireless network called Vehicular Ad Hoc Network. -Vehicular ad hoc networks (VANETs) are a subgroup of
More informationPass, No Record: An Android Password Manager
Pass, No Record: An Android Password Manager Alex Konradi, Samuel Yeom December 4, 2015 Abstract Pass, No Record is an Android password manager that allows users to securely retrieve passwords from a server
More informationNew Era of authentication: 3-D Password
New Era of authentication: 3-D Password Shubham Bhardwaj, Varun Gandhi, Varsha Yadav, Lalit Poddar Abstract Current authentication systems suffer from many weaknesses. Textual passwords are commonly used.
More informationVolume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at
Volume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No. 0976-5697 Design of Architecture for Efficient
More informationKeywords security model, online banking, authentication, biometric, variable tokens
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Authentication
More informationA New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam
More information1-7 Attacks on Cryptosystems
1-7 Attacks on Cryptosystems In the present era, not only business but almost all the aspects of human life are driven by information. Hence, it has become imperative to protect useful information from
More informationRemote User Authentication Scheme in Multi-server Environment using Smart Card
Remote User Authentication Scheme in Multi-server Environment using Smart Card Jitendra Kumar Tyagi A.K. Srivastava Pratap Singh Patwal ABSTRACT In a single server environment, one server is responsible
More informationEnhancing Data Security with Certificateless Signature Scheme in Cloud Computing
International Journal of Computer Engineering and Applications, Special Edition www.ijcea.com ISSN 2321-3469 Enhancing Data Security with Certificateless Signature Scheme in Cloud Computing Sonu Kumar
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives
More informationA Secure System for Evaluation and Management of Authentication, Trust and Reputation in Cloud-Integrated Sensor Networks
International Journal of Engineering and Technical Research (IJETR) A Secure System for Evaluation and Management of Authentication, Trust and Reputation in Cloud-Integrated Sensor Networks Ms. Arati Phadtare,
More informationSelf Destruction Of Data On Cloud Computing
Volume 118 No. 24 2018 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ Self Destruction Of Data On Cloud Computing Pradnya Harpale 1,Mohini Korde 2, Pritam
More informationDetection and Removal of Blackhole Attack Using Handshake Mechanism in MANET and VANET
IOSR Journal of Mobile Computing & Application (IOSR-JMCA) e-issn: 2394-0050, P-ISSN: 2394-0042.Volume 2, Issue 1. (Mar. - Apr. 2015), PP 01-05 www.iosrjournals.org Detection and Removal of Blackhole Attack
More informationChapter 6 Network and Internet Security and Privacy
Chapter 6 Network and Internet Security and Privacy Learning Objectives LO6.1: Explain network and Internet security concerns LO6.2: Identify online threats LO6.3: Describe cyberstalking and other personal
More informationOn the Security of Yoon and Yoo s Biometrics Remote User Authentication Scheme
On the Security of Yoon and Yoo s Biometrics Remote User Authentication Scheme MING LIU * Department of Tourism Management WEN-GONG SHIEH Department of Information Management Chinese Culture University
More informationSurvey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationAvailable Online through
D. Saravanan*et al. /International Journal of Pharmacy & Technology Available Online through ISSN: 0975-766X CODEN: IJPTFI Research Article www.ijptonline.com VALIDATION OF SECRET CODE USING IMAGE BASED
More informationComputer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University
Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two
More informationInternational Journal of Electrical and Computer Engineering 4: Application of Neural Network in User Authentication for Smart Home System
Application of Neural Network in User Authentication for Smart Home System A. Joseph, D.B.L. Bong, and D.A.A. Mat Abstract Security has been an important issue and concern in the smart home systems. Smart
More informationDetecting Insider Attacks on Databases using Blockchains
Detecting Insider Attacks on Databases using Blockchains Shubham Sharma, Rahul Gupta, Shubham Sahai Srivastava and Sandeep K. Shukla Department of Computer Science and Engineering Indian Institute of Technology,
More informationApplying Context to Web Authentication
Applying Context to Web Authentication John Linn, Burt Kaliski, and Moti Yung, RSA Laboratories; Magnus Nyström, RSA Security Inc. Prepared for W3C Workshop on Transparency and Usability of Web Authentication,
More informationBuffer Overflow attack avoiding Signature free technique
Buffer Overflow attack avoiding Signature free technique Umesh Deshmukh Student of Comuter Engineering S.E.C.O.E.Kopargaon,A Nagar Maharastra,India Prof.P.N.Kalawadekar Department of Computer Engineering
More informationFarewell Syskey! 2017 Passcape Software
Farewell Syskey! 2 Farewell Syskey! I Introduction 3 II How Syskey works 4 1 What is Syskey... 4 2 syskey.exe utility... 4 3 Syskey encryption key storage... 4 System registry... 4 Startup diskette...
More informationEncryption. INST 346, Section 0201 April 3, 2018
Encryption INST 346, Section 0201 April 3, 2018 Goals for Today Symmetric Key Encryption Public Key Encryption Certificate Authorities Secure Sockets Layer Simple encryption scheme substitution cipher:
More informationFormal Methods for Assuring Security of Computer Networks
for Assuring of Computer Networks May 8, 2012 Outline Testing 1 Testing 2 Tools for formal methods Model based software development 3 Principals of security Key security properties Assessing security protocols
More informationBinary Protector: Intrusion Detection in Multitier Web Applications
Binary Protector: Intrusion Detection in Multitier Web Applications C. Venkatesh 1 D.Nagaraju 2 T.Sunil Kumar Reddy 3 1 P.G Scholar, CSE Dept, Sir Vishveshwariah Institute of Science and Technology 2 Assistant
More informationSystem Approach for Single Keyword Search for Encrypted data files Guarantees in Public Infrastructure Clouds
System Approach for Single Keyword Search for Encrypted data files Guarantees in Public Infrastructure s B.Nandan 1, M.Haripriya 2, N.Tejaswi 3, N. Sai Kishore 4 Associate Professor, Department of CSE,
More informationOnline Banking Security
Online Banking Security Fabian Alenius Uwe Bauknecht May 17, 2009 Contents 1 Introduction 2 2 Secure Communication 2 2.1 Password authentication..................... 2 2.2 One-time Passwords.......................
More informationSecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine Security Policy Abstract: This document specifies Security Policy enforced by the SecureDoc Cryptographic Engine compliant with the requirements of FIPS 140-2
More informationAchieving End-to-End Security in the Internet of Things (IoT)
Achieving End-to-End Security in the Internet of Things (IoT) Optimize Your IoT Services with Carrier-Grade Cellular IoT June 2016 Achieving End-to-End Security in the Internet of Things (IoT) Table of
More informationFrequently Asked Questions (FAQ)
Your personal information and account security is important to us. This product employs a Secure Sign On process that includes layers of protection at time of product log in to mitigate risk, and thwart
More informationEnhancing Salted Password Hashing Technique Using Swapping Elements in an Array Algorithm
IJCST Vo l. 9, Is s u e 1, Ja n - Ma r c h 2018 ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) Enhancing Salted Password Hashing Technique Using Swapping Elements in an Array Algorithm 1 Dr. Abdelrahman
More informationNetwork Access Flows APPENDIXB
APPENDIXB This appendix describes the authentication flows in Cisco Identity Services Engine (ISE) by using RADIUS-based Extensible Authentication Protocol (EAP) and non-eap protocols. Authentication verifies
More informationCryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 38 A Tutorial on Network Protocols
More informationSecuring Your Campus
Securing Your Campus Copyright CheckVideo LLC. All Rights Reserved. Introduction Security and Safety Officers are committed to providing a safe and welcoming learning environment that prepares students
More informationSecure management using HP Network Node Manager SPI for SNMPv3
IT Operations Network Management Secure management using HP Network Node Manager SPI for SNMPv3 2007 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without
More informationPrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps
PrepAwayExam http://www.prepawayexam.com/ High-efficient Exam Materials are the best high pass-rate Exam Dumps Exam : 642-541 Title : VPN and Security Cisco SAFE Implementation Exam (CSI) Vendors : Cisco
More informationCSE 565 Computer Security Fall 2018
CSE 565 Computer Security Fall 2018 Lecture 9: Authentication Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Definition of entity authentication Solutions password-based
More informationSMARTPHONE BASED SURVEILLANCE SYSTEM WITH INTRUSION DETECTION
International Journal of Computer Engineering and Applications, Volume XI, Special Issue, May 17, www.ijcea.com ISSN 2321-3469 SMARTPHONE BASED SURVEILLANCE SYSTEM WITH INTRUSION DETECTION Sneha Khandare
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK DISTRIBUTED FRAMEWORK FOR DATA MINING AS A SERVICE ON PRIVATE CLOUD RUCHA V. JAMNEKAR
More informationSecurity: Cryptography
Security: Cryptography Computer Science and Engineering College of Engineering The Ohio State University Lecture 38 Some High-Level Goals Confidentiality Non-authorized users have limited access Integrity
More informationINTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD
INTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD Jeffy Mwakalinga, Prof Louise Yngström Department of Computer and System Sciences Royal Institute of Technology / Stockholm University
More informationBusiness Logic Attacks BATs and BLBs
Business Logic Attacks BATs and BLBs Noa Bar-Yosef Security Research Engineer Imperva 12/02/2009 noa@imperva.com Copyright The Foundation Permission is granted to copy, distribute and/or modify this document
More informationIntroduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur
Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 50 Connected Vehicles II So, now we are going to continue
More informationWireless LAN Security (RM12/2002)
Information Technology in Education Project Reference Materials Wireless LAN Security (RM12/2002) Infrastructure Division Education Department The Government of HKSAR www.ited.ed.gov.hk December 2002 For
More informationNeed and Challenges of Driving License Authentication Using Biometrics
Need and Challenges of Driving License Authentication Using Biometrics Divya Gangamwar Akash Bande Pallavi Gaykar Dr. Nilesh J Uke Professor, ABSTRACT License authentication is a very difficult task for
More informationAdvanced Spam Detection Methodology by the Neural Network Classifier
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More informationIntroduction to Information Security Prof. V. Kamakoti Department of Computer Science and Engineering Indian Institute of Technology, Madras
Introduction to Information Security Prof. V. Kamakoti Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture 09 Now, we discuss about the insecurity of passwords.
More informationSecurity Specification
Security Specification Security Specification Table of contents 1. Overview 2. Zero-knowledge cryptosystem a. The master password b. Secure user authentication c. Host-proof hosting d. Two-factor authentication
More informationZimperium Global Threat Data
Zimperium Global Threat Report Q2-2017 700 CVEs per Year for Mobile OS 500 300 100 07 08 09 10 11 12 13 14 15 16 17 Outdated ios Outdated ANDROID 1 of 4 Devices Introduces Unnecessary Risk 1 out of 50
More informationTECHNICAL BRIEF. Data Integrity During a File Copy TECHNICAL BRIEF
Data Integrity During a File Copy June 2018. Copyright Datadobi, all rights reserved. Datadobi believes the information in this publication is accurate as of its publication date. The information is subject
More informationSecuring MANETs using Cluster-based Certificate Revocation Method: An Overview
Securing MANETs using Cluster-based Certificate Revocation Method: An Overview Mrs. Dipti S. Sawant Dept. of Computer Engineering, Sinhgad College of Engineering, Pune, India. 411 041 Prof. J. E. Kamalasekaran
More informationForensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the Cloud
Forensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the Cloud Ezz El-Din Hemdan 1, Manjaiah D.H 2 Research Scholar, Department of Computer Science, Mangalore University,
More informationSecurity Enhancements
OVERVIEW Security Enhancements February 9, 2009 Abstract This paper provides an introduction to the security enhancements in Microsoft Windows 7. Built upon the security foundations of Windows Vista, Windows
More informationInternational Journal of Advance Engineering and Research Development. Traffic Police Management :Vehicle Document Verification System Using QR Code
Scientific Journal of Impact Factor (SJIF): 5.71 e-issn (O): 2348-4470 p-issn (P): 2348-6406 International Journal of Advance Engineering and Research Development Volume 5, Issue 03, March -2018 Traffic
More informationINCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.
INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS Protect Critical Enterprise Applications and Cardholder Information with Enterprise Application Access Scope and Audience This guide is for
More informationmsis Security Policy and Protocol
msis Security Policy and Protocol Introduction This Policy details the secure use of msis as a tool for the capture and reporting of internet intelligence and investigations (i3). msis is a powerful i3
More informationIJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 2013 ISSN:
SIMHA : Secure Biometric Multi-Host Authentication Ramya K P 1, Chithra Devi R 2 and Revathi M K 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamil Nadu 628215,
More informationPublic-key Cryptography: Theory and Practice
Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Chapter 1: Overview What is Cryptography? Cryptography is the study of
More informationRashmi P. Sarode et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (5), 2015,
SMS Encryption Rashmi P. Sarode *, Neeraj Manglani Department of Computer Science Jagan Nath University, Jaipur, India Abstract In the application of Computer Science, the performance of classification
More informationExam : Title : Security Solutions for Systems Engineers(SSSE) Version : Demo
Exam : 642-565 Title : Security Solutions for Systems Engineers(SSSE) Version : Demo 1. SomeCompany, Ltd. wants to implement the the PCI Data Security Standard to protect sensitive cardholder information.
More informationApplication Layer Security
Application Layer Security General overview Ma. Angel Marquez Andrade Benefits of web Applications: No need to distribute separate client software Changes to the interface take effect immediately Client-side
More informationUNIT - IV Cryptographic Hash Function 31.1
UNIT - IV Cryptographic Hash Function 31.1 31-11 SECURITY SERVICES Network security can provide five services. Four of these services are related to the message exchanged using the network. The fifth service
More information